View oana.raileanu Profile
UserName: oana.raileanu Contact this user
Articles posted by oana.raileanu

Malware in 2009: more sophisticated, more difficult to detect and simply .. more

2009 is expected to bring a continuing increase in the amount of malware, as Panda Security research shows that during the first half of 2008 as many malware strains (viruses, worms, Trojans etc.) in circulation as in the previous 17 years combined...

Expand Your Mail Server to Suit Your Needs

Lately, more and more companies that rely on IT services have begun to understand the true benefits of network subsystem interaction. Some of the well established examples are already accepted as being the de facto way of doing things. To a lot of...

AXIGEN Compliance with E.U. and U.S. Data Retention Policies

Why Data Retention? Lately, the Internet news sites and blogs have all been buzzing with reports of privacy infringements by various IT companies, regulation changes and updates on the laws already in effect, all related to data retention policies....

Open source applications sit at IT strategy table during recession

(Kristen Caretta - Associate Editor, SearchCIO-Midmarket) In tough times, the "free" price tag of open source software is too good for some CIOs to pass by without at least a second glance. But it can be buyer beware: Despite short-term cost...

Server and storage budgets affected by recession

(Mark Schlack, Vice President, Editorial) Recent years have seen large infrastructure investments in IT -- storage area networks, network-attached storage, server farms, etc. -- but the economic downturn has forced some to cut back. While a little...

Four developments that will make 2009 a critical and memorable year in tech

Economic downturns are a time when a lot of innovation happens quietly under the radar. That’s because some companies get sidetracked trying to stay alive and weaker competitors often go out of business. That leaves the door wide open for...

Compliance 2009 trends: virtualization, unified mapping and automation

(Todd Erickson, News and Features Writer) During 2007 and 2008, Congress and state legislatures were busy passing, refining and enacting hundreds of laws that require new IT strategies for storing, protecting and accessing organization and customer...

Choosing the best server OS: Linux vs. Windows comparisons

(Logan G. Harbaugh) In a way, server operating systems are simpler than workstation OSes. They don't need to support as wide a variety of accessories and generally don't need to run as wide a variety of applications. On the other hand, the...

Using Linux in a data center consolidation management strategy

(Ken Milberg) Why is Linux the answer for data center consolidation? To start, for a large IT infrastructure project to be approved in today's climate, it must make real business sense. The project must have a significant return on investment (ROI),...

TPC-E: New IT benchmarks for OLTP database servers

(Matthew Emmerton) Benchmarks are a critical part of the IT industry. They allow us to measure technological progress, enable buyers to compare offerings from multiple vendors and help vendors improve their products. In the world of database servers,...

10 obscure Linux applications you need to try

(Jack Wallen) Do a search for Linux applications on Freshmeat and you’ll get around 11,828 hits. (As of January 12, 2008, that was the tally.) Of those 11,828 applications, which ones are worth using? Not 100 percent of them for sure. Still,...

Security as a Service: Friend or Foe?

(Linda Tucci, Senior News Writer, SearchCIO-Midmarket) IT security typically has been deemed one of those services best provided in-house. But the stigma attached to outsourcing security and Security as a Service - namely that an outsider does not...

Storage industry debates standardized cloud API

(Beth Pariseau, Senior News Writer, SearchStorage) As interest around the cloud grows, industry experts are debating whether or not to establish a standard application programming interface (API) for sending data to and from cloud service providers....

Will cloud computing change how IT works today?

(Steven Warren, TechRepublic) Unless you’ve been sleeping this past year, you’ve heard about cloud computing. It seems as if many companies are looking at this heavily for the future.[...]The economy today is not in the best shape it has...

10 iptables rules to help secure your Linux box

(Jack Wallen, TechRepublic) The iptables tool is a magnificent means of securing a Linux box. But it can be rather overwhelming. Even after you gain a solid understanding of the command structure and know what to lock down and how to lock it down,...

Restless data: Diffusion via virtualization

(Tom Olzak, IT Security) Before virtualization, keeping track of servers popping up in the data center was pretty easy.  There was significant effort to bring up the hardware, and everyone followed the traditional change management...

Optimizing server energy efficiency

(Julius Neudorfer, TechTarget) Data center energy efficiency is the hot topic of the day. IT operators are working to quantify and improve the efficiency of their data centers, and that means improving server energy efficiency as well. Of course we...

How disaster recovery savings can pay for business continuity planning

(Linda Tucci, Senior News Writer, TechTarget) When asked to name the toughest ongoing challenge in business continuity (BC) planning, the majority of midsized organizations say it is inadequate funding. Given that financial hurdle, one strategy for...

Using virtualization to reinvent high-performance computing on Linux

(Bill Weinberg, EntrepriseLinux) Virtualization has been the hot technology and certainly the killer app-enabler of the last several years, building on readily-available open source technology (e.g., Linux and Xen) with adoption marching in step with...

Virtualization for high-performance computing on Linux: Critiques and challenges

(Bill Weinberg, EntrepriseLinux) Why don't we see more pervasive use of virtualization in HPC? Well, you may have heard this: There ain't no such thing as a free lunch. In some cases, virtualization technology may not (yet) meet legacy HPC...

The industry's 10 best IT certifications

(Erik Eckel, TechRepublic) IT certifications boast numerous benefits. They bolster resumes, encourage higher salaries, and assist in job retention. But which IT certifications are best? Technology professionals generate much debate over just that...

Keeping Virtual Security Real

(Nick Lowe, Check Point) Remember the first time you drove a car on your own, and you’d get a kick from the sensation of sheer speed? Unfortunately, you also have to learn the mundane stuff like how to turn, stop and reverse safely. The same is...

Malware will use web and USB sticks to spread in 2009

(Angela Moscaritolo, SecureComputing) This year, enterprises must have the appropriate protection in place to secure their organization from internet and removable storage device malware in their environments, according to David Marcus, director of...

How to manage your risk with Web applications

(Polly Schneider Traylor, TechRepublic) Web apps continue to grow in popularity, but companies have legitimate concerns about security and reliability. Here are some ways to address potential risks and make sure you choose the right vendor....

URL shortening: Yet another security risk

(Michael Kassner, TechRepublic) URL-shortening services such as TinyURL and Bit.ly are becoming popular attack vectors. You may not want to automatically click on the shortened URL after you read this. Originally, the process of URL shortening was...

Get smart about patching security vulnerabilities

(Linda Tucci, Senior News Writer, SearchCIO-Midmarket) How can companies be free of security vulnerabilities? They could ferret out all the flaws in their computer products and patch them. They could prevent flaws from being exploited by shutting down...

Storage best practices for virtual server environments

(Carol Sliwa, Features Writer, SearchStorage) Storage performance measurement (SPM) has always been a difficult proposition for IT organizations, and the job has become even more challenging now that virtual servers are so popular. Take RiskMetrics...

Green your data center by deploying shared storage with the right features

(Scott Lowe, TechRepublic) With companies doing everything possible to conserve cash, conserving power has quickly become an important part of the IT portfolio. No longer is physical server sprawl an option; in terms of both hardware acquisition costs...

Making Sense Of E-Mail Threats

(Samara Lynn, ChannelWeb) In light of all the ongoing, and terrible, security trends and case studies involving credit-card-number theft, bot attacks and remote execution of malicious code, e-mail spam seems more like a minor nuisance rather than an...

Mobile Email Solutions Using Push Email & PIM Synchronization

While the complexity and requirements that large scale solutions must achieve have greatly increased during the last few years, a growing number of service providers have also started to include support for enterprise functionalities in order to...

Making sense of basic unified threat management features

(Joel Snyder, TechTarget) If you've bought a firewall in the last 3 years, you've bought a UTM firewall: a device that will not only control traffic based on policy, but also one that has other built-in threat mitigation technologies, such as...

Resurrecting a failed ITSM implementation

(George Spafford, TechTarget) Organizations are eager to improve the effectiveness and efficiency of IT services. The IT Infrastructure Library (ITIL) has much to offer with its IT Service Management (ITSM) philosophy and reference processes. The...

How likely is your software to survive the recession?

(Chad Perrin, TechRepublic) A recession economy can affect more than just your employer’s revenue stream; it can also affect the software you use. It’s time to start thinking about how to minimize any negative effects that may have on your...

Fighting spyware with unified threat management

(Lisa Phifer, TechTarget) Spyware is no longer just a petty nuisance, clogging enterprise desktops and access links - it's also crimeware, driven by the desire for illicit profits. Gartner estimates that these financially motivated attacks will...

AXIGEN Mail Server 7.0, Now with Push Email, PIM Syncronization and more

AXIGEN ( http://www.axigen.com ), the professional messaging solution vendor, released today a new commercial version of its messaging solution, Axigen Mail Server 7.0.  Freshly added features in version 7.0 include built-in support for...

Greening the data center: Consolidate your servers

(Scott Lowe , TechRepublic) Energy usage in the data center has become a prime target in efforts to reduce the carbon footprint or overall energy usage for organizations. There are numerous ways that you can accomplish this green goal. Server...

Top 10 peeves of a support tech

(Becky Roberts, TechRepublic) We all work in different environments, in different industries, with different departmental structures, different installed bases, and different users. But as support techs, we share the common goal of helping people and...

Conficker Worm To Strike April 1

(Stefanie Hoffman, ChannelWeb) The Conficker worm that has left a trail of destruction in its wake for the last six months is set for a new evolution April 1 that will enable it to stealthily launch a variety of malware attacks unbeknownst to the...

How data centers cope with the economic downturn

(Matt Stansberry, Executive Editor, TechTarget) Between February and March 2009, SearchDataCenter.com conducted a survey on how data center managers are coping in the economic downturn. Subscribers were contacted by email and 235 end users, primarily...

How an ITSM implementation can help in a recession

(Kristen Caretta, Associate Editor, TechTarget) IT Service Management (ITSM) can often be a hard sell even in a solid economy. Frameworks such as the IT Infrastructure Library (ITIL), COBIT and Six Sigma have often been described as "nice to...

Avoiding disaster recovery pitfalls in VMware and Linux

(Richard Jones, TechTarget) Last year, at several seminars on advanced enterprise virtualization, I asked attendees about their virtualization deployments. Most had deployed VMware with the Virtual Machine File System (VMFS) as the storage file...

Virtualization be damned: Power-efficient servers best bet for some

(Bridget Botelho, News Writer) While many IT pros use virtualization to avert server sprawl and keep power costs low, others lack the resources to or resist going virtual because of performance overhead, however low it may be. One such company is...

How many firewalls do you need?

(Joel Snyder, Security Operations and Strategies) When you look at your firewalls and security policy, it's helpful to learn two new terms: "client-protecting" and "server-protecting." The reason we need these terms is that you...

More OSes gain hypervisors, but most users choose OS-independent approach

(Bridget Botelho, News Writer) With the rise of KVM and Hyper-V, the move is clearly afoot to build hypervisors into operating systems, but most users say the OS-independent approach to virtualization is here to stay. Non-OS based virtualization...

Managing virtualization deployments for customers

(Heather Clancy, TechTarget) Now that virtualization deployments are creeping out of test beds and extending more deeply into corporate data centers, a serious challenge has risen: How can organizations manage these increasingly complex environments?...

A look at real-world exploits of Linux security vulnerabilities

(Kevin Beaver, CISSP) Probably the simplest exploit to carry out against Linux systems is to look for unprotected NetBIOS shares. Weak Samba configurations are often very revealing. For example, file shares created for the sake of convenience can end...

Introduction to Innovative Mail Filtering with AXIGEN

The problem with electronic mail today Email is not what it was supposed to be. Its inventors have not foreseen the dan¬gers associated with this new form of communication. Means of protection were added later on, but do little to protect...

Unsecured mobile devices could open a new back door into your network

(Paul Mah, TechRepublic) What kind of security policies do you enforce on mobile devices and smartphones that employees bring into the office? Are unsecured mobile devices opening up a back door into your corporate network? A study conducted by...

Solutions to the top 10 peeves of a support tech

(Becky Roberts, TechRepublic) Grumbling and whining about various aspects of our jobs, especially our users, is all too easy to do. Everyone does it, and it can have some therapeutic and entertainment value, but perhaps our energies would be better...

Hijacked Address Book: How did it happen and what to do?

(Joe Rosberg, TechRepublic) Most of us have seen those spoof e-mails, when a personal e-mail address has been commandeered for the purpose of sending spam, but in this case, to everyone in your Address Book. Here are a few ways it could happen:...

AXIGEN Mail Server & eDirectory Services Integration

This article focuses on the integration between the AXIGEN messaging solution and the eDirectory Services product developed by Novell. The actual level of interaction between the solutions is limited to the user authentication process....

Have we now entered the post-OS era?

(Jason Hiner, Editor in Chief, TechSanityCheck) Microsoft knew this day was coming. This was the reason it desperately wanted — no, needed — to take down Netscape in 1996. Netscape wasn’t just trying to build a program for reading...

Virtualized Systems Can Be A Security Risk

(Rick Whiting, ChannelWeb) With companies looking for ways to cut their IT infrastructure costs, there's no hotter technology right now than virtualization. But those cost savings could carry a big price in compromised security if IT managers aren't...

The 10 faces of computer malware

(Michael Kassner, TechRepublic) The complexity of today’s IT environment makes it easy for computer malware to exist, even flourish. Being informed about what’s out there is a good first step to avoid problems. With all the different...

Linux and Windows compromised at boot

(Chad Perrin, TechRepublic) There’s a lot of debate over what constitutes a “secure” operating system. The debates seem to become most heated when people compare the Big Three of home desktop OSes — Microsoft Windows, Apple...

Security essentials for Active Directory on Linux

(Kevin Beaver, CISSP TechTarget) As businesses continue to integrate Linux into their existing Windows infrastructures, extending Active Directory functionality to accommodate these systems is becoming more appealing. Many shops already run some...

Cloud Computing: When It Rains, It Pours

(Edward F. Moltzen, Samara Lynn, ChannelWeb) Cloud computing is the next big thing, or current big thing, in information technology. It's fast. It's cheap. It's easy. It works. What could possibly go wrong? Let's be clear: Don't expect "the...

Email archiving needs soar as e-discovery requests rise

(Carol Sliwa, TechTarget) Regulatory compliance requirements confronting financial service firms triggered a rush of email archiving products more than a decade ago, and today, the need to retain emails for legal discovery is driving a new wave of...

Ubuntu a minor player? Not outside the States

(Christopher Dawson, Zdnet) There are a lot of people outside the United States doing a lot of incredibly innovative things in education and many of them are doing it cheaply with Linux. So-called “emerging markets” (which, at this rate,...

Calculating the fully loaded costs of corporate email: It's bigger than you think

(Ted Schadler, ZDNet) After a survey of 53 information & knowledge management professionals to ask about the cost of email, it is abundantly clear that few firms know their true cost of running email on-premises. And this matters if you’re...

How to configure email antivirus scanners to block only when necessary

(Joel Snyder, TechTarget) Some email managers have asked for the ability to stop certain types of files from coming through the system. The premise is simple: some types of files are rarely legitimately sent. A good example would be a file with an...

Why You Should Consider an Alternative Email Platform

1. About This White Paper This white paper is sponsored by Gecad Technologies, the developer of AXIGEN, an alternative to Microsoft Exchange.  While Exchange is a solid and robust email platform that has roughly 150 million users in its...

Are economic conditions changing how you manage server turnover?

(Scott Lowe, TechRepublic) Between cloud computing, virtualization, and economic conditions, the data center has certainly changed form over the past 10 years. Where there used to be a box for each discrete workload, we now have boxes running...

IT Professionals Don't Walk The Walk On Mobile Security

(Jennifer Bosavage, ChannelWeb) A new survey finds that IT security professionals are suffering from "password fatigue" when it comes to using their mobile devices. Credant Technologies, an endpoint data security vendor, surveyed 227 IT...

Google's approach to software won't work for enterprise or mobile

(Jason Hiner, Editor in Chief, TechSanityCheck) Google is making a big run at new markets with business software and mobile phones. However, it will not succeed in either market unless it changes the way it builds its products. Both of these markets...

Tips for ensuring a user-friendly email archiving system

(Stephen Foskett, Storage) As companies look to archive their user's emails for business and compliance and/or litigation reasons, finding an archiving product that fits your company's needs can be a time-consuming process. While cost is always a...

Take the e-mail test: Can collaboration tools save time and money?

(Sam Diaz, ZDNet) E-mail overload, though a problem for years, has always been a concern for the overwhelmed user. But even corporate networks can take a beating as the sheer volume of messages has increased. It’s not brain surgery; it makes...

The Web's most dangerous keywords to search for

(Dancho Danchev, ZDNetSecurity) Which is the most dangerous keyword to search for using public search engines these days? It’s “screensavers” with a maximum risk of 59.1 percent, according to McAfee’s recently released report...

Essential e-mail security measures

(Chad Perrin, TechRepublic) E-mail security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of e-mail security is ensuring you don’t shoot yourself in the foot. These best practices...

Prevent malware from spreading by e-mail links and attachments

(Michael Kassner, TechRepublic) There seems to be a run on e-mail induced malware lately. It seems that e-mail as a malware delivery vehicle is getting a second wind. E-mail attachments and links are popular methods for bad guys to install malware on...

Email Clustering and Cloud Email Services

Lately, there has been a lot of buzz about the brand new cloud computing paradigm. Supposedly, through this type of cloud resource, you would get the same performance and user experience levels as with classic systems. Some companies have moved word...

Wall Street looks to cloud technology for its next bailout

(Joe McKendrick, ZDNet) Can new technology initiatives help pull Wall Street out of the danger zone? A new survey released by IBM and Securities Industry and Financial Markets Association (SIFMA) finds that IT budgets are tight on Wall Street, but...

Linux's position in cloud computing efforts

(Pam Derringer, News Contributor, TechTarget) Clouds are such big Linux news these days that, in the physical world, it would be raining by now. Or at least heavily overcast. The latest development is a Linux Foundation's report on Linux and cloud...

iPhone apps are Google's biggest threat in mobile search

(Jason Hiner, TechSanityCheck) Google created the Android mobile OS because it wants its search engine to remain relevant as the world migrates more toward mobile computing. But Google’s biggest challenge in mobile search is not other search...

Software-as-a-service a good choice for fighting spam

(Neil Roiter, Senior Technology Editor, TechTarget) It's tough to keep pace with the explosive growth of spam if you build an in-house email security solution. Commercial software and appliances are more efficient and have the features to make life...

Ten reasons open-source smartphones will win out

(Jack Wallen, ZDNet UK) Open source brings far more benefits to the mobile market than just cost savings. The mobile industry is becoming interesting. We have finally reached a point where the smartphone is actually smart and the average user can...

Cashing In On The iPhone Age: Are Web CMS Vendors Missing a Trick?

(Robert Bredlau, CMS Wire) Only by living on Mars could one have avoided hearing about the iPhone or BlackBerry and their entrances into the corporate world. Millions of consumers and business people are testament to the popularity of the handheld...

Flash/Acrobat Reader Vulnerabilities: The Biggest Security Hole on the Web?

(Chris Crum, WebProNews) Two weeks ago, Adobe released a critical patch for Flash Player and Acrobat Reader. According to online security company Trusteer, about 80% of users are still vulnerable, and perhaps more startling, the company views this as...

Smartphones to become major hacker target

(Robert McMillan, TechWorld) Smartphones are set to become a prime target for criminals according to Google's head of Android security. "The smartphone OS will become a major security target," said Android Security Leader Rich Cannings,...

10 ways to turn your mobile phone into an efficient business tool

(Polly Schneider Traylor, TechRepublic) Increasingly sophisticated smartphone capabilities are making it easier for road warriors to accomplish business tasks. When you’re away from the office with only a mobile phone in hand, the application...

Five cloud computing myths exploded

(Cath Everett, ZDNet) Cloud computing is one of the most overhyped phenomena to have hit the IT industry in a long time. It is a business model that definitely has its advantages. The trouble is vendors of all sizes and stripes are so desperate for a...

Will virtualization bend or break licensing rules?

(Stewart Buchanan, ZDNet) Virtualization can produce some nasty surprises in licensing costs, so it repays to study the small print. Whatever people may imagine, the fact is that application virtualization can create higher than expected licensing...

Web May Be Ultimate Mobile Platform

(Marin Perez, InformationWeek) While Google, Nokia and Palm take different approaches to the mobile space, executives from each company agreed that the mobile Web will play a significant role in future application development. At the MobileBeat...

Open source solutions vs. SaaS applications: Weigh the options

(Kristen Caretta, Associate Editor, SearchCIO-Midmarket) The application options available for the midmarket are many and varied. Two popular alternatives to the more traditional - and often more costly - route of on-premise applications are open...

The Incredible Shrinking Operating System

(Saul Hansell, NYtimes) Google’s new Chrome operating system is a challenge to Microsoft in several ways. It will offer a free rival to Windows, which can add $25 to $100 to the price of a computer. But it also represents a conceptual slap at...

Axigen Integration with Veritas Cluster Server 5.0

Around two years ago the Axigen Mail Server began the Cluster Support Era with the final touches being added to the SMTP, POP3, IMAP and Webmail proxy services. Back in the day, our main concern was the Red Hat Clustering Suite included in the RHEL5...

Ten things they didn't tell you about mobile working

(Jeff Dray, TechRepublic) After years spent supporting mobile devices and more years as a user of mobile data products, you may find that,  in some ways, mobile working is a liberating experience, but if you’re not careful, it can follow...

Virtualization's next phase: DR, BC and cloud computing

(Niel Nickolaisen, Contributor, TechTarget) Many midmarket CIOs now use virtualization for mission-critical servers. We are also using it to improve availability of critical services. Some are using it to redefine disaster recovery and business...

All Linux needs is a good commercial

(Jack Wallen, Linux and Open Source - TechRepublic) That’s what commercials do. They take products and make them desirable, no matter what the product. Think about how many bad products have been sold by good commercials. The right commercial...

Management tools for virtualized servers: A look at the options

(Christina Torode, Senior News Writer, TechTarget) IT directors may seek that single pane of glass for managing an IT environment, but for now, at least, that seems as unattainable as ever given the added need to manage virtualized servers. A lack of...

Hosted Hosting: Should Service Providers Go Hosted?

Service Provider Hosting Is Possible The simple concept of hosted services , already known and widely used for enterprise environments for quite some time, represents the perfect solution for a great number of small and medium sized companies that...

Ubuntu 9.10 makes a serious charge toward the enterprise level

(Jack Wallen, TechRepublic) At the end of this month (October 29th, 2009 to be exact), Ubuntu will be releasing its newest take on the Linux operating system. This time around, it should be obvious (even to the biggest of skeptics) that Ubuntu is...

Economics and virtualization stunt Linux server growth

(Leah Rosin, Site Editor, EnterpriseLinux) As the economy struggled in 2008, some IT pros thought Linux adoption and use would grow in enterprise data centers. After all, Linux is supposed to be the low-cost solution. A year ago, nearly half (47%) of...

Server hardware cost comparison: Is virtualization cheaper?

(Logan G. Harbaugh, TechTarget) It seems to be assumed that running eight OSes on a single large server with a virtualization suite is cheaper than running eight separate physical servers. Leaving aside for the moment the cost of virtualization...

Top server virtualization challenges: Backups and bottlenecks

(Todd R. Weiss, SearchServerVirtualization.com) Despite the many benefits of server virtualization, the technology still poses challenges for corporate data centers. TechTarget's recent "Virtualization Decisions 2009 Purchasing Intentions...

How to decide if changing technology vendors is worth the time, risk

(Linda Tucci, Senior News Writer, TechTarget) The recession has intensified some companies' need to shop around for new vendors and better deals, and in some cases is turning best practice for changing technology vendors on its head. Just ask Bill...

Only two percent of iPhone apps categorized for business

(Bill Detwiler, TechRepublic) AppShopper, a Web site which tracks iPhone and iPod Touch applications, has noted that Apple’s App Store has surpassed 100,000 approved apps, although just over 93,000 are available. This revelation and the raging...

Linux jobs outpacing Windows; virtualization is 'hot'

(Pam Derringer, News Contributor, TechTarget) Windows job-seekers may have 30% more available openings today in the U.S. than their Linux counterparts. On the flipside, however, the number of Linux listings nationwide is growing while demand for...

Hardening Linux with Bastille UNIX

(Kevin Beaver, CISSP) Even with the common vulnerabilities I've talked about in the past, Linux is a solid operating system (OS) that stands up well to security tests. This doesn't mean, however, that you should let your guard down. Over time,...

Standardized virtualization environments preferred, survey says

(Bill Claybrook, TechTarget) Let's explore the pros and cons of running multiple vendors' platforms in your virtualization environment and review the virtual appliance and cloud computing markets. Virtualization environments: To mix or not to mix?...

Managing e-mail to prevent information leakage

(Paul Mah, TechRepublic) The rush to open e-mails via the network can lead to potential leaks via mobile devices and other unsecured devices. Smartphone device loyalty will trump standardization in the enterprise. While it is conceivable for IT...

The market has rejected Linux desktops. Get over it.

(Jason Hiner, TechSanityCheck) I’ve been running Linux on PCs since 1998, when Red Hat still cared about the desktop and Mandrake was supposed to be the distribution that was going to bring Linux to the masses. That was also about the time that...

Identity Confirmation - Challenge / Response anti-spam filtering with a twist

This article performs a comprehensive analysis of Axigen Identity Confirmation© - a Challenge / Response-based anti-spam system embedded in the Axigen solution. It is a pertinent presentation of the concept, characteristics and benefits entailed...
News posted by oana.raileanu

AXIGEN Joins Microsoft's Empower Initiative for ISVs

Bucharest, Romania, February 16, 2009 – AXIGEN (http://www.axigen.com), the professional messaging solution vendor, announces it has joined the Empower for ISVs (Independent Software Vendors) initiative, partnership program designed by Microsoft...

AXIGEN Announces Technology Partnership with Intel

Bucharest, Romania, March 4th, 2009 – AXIGEN (http://www.axigen.com), the professional messaging solution vendor, today announces they have become a member of the Intel Software Partner Program (http://www.intel.com/partner), with the intention...

AXIGEN Mail Server 7.0 Beta, Now with Fresh Mobile Email and Centralized Management Features

The AXIGEN Team is happy to announce the release of the new 7.0 Beta version of AXIGEN Mail Server. Along with various enhancements, this release comes with a fresh set of features pertaining to mobile email communication, collaboration and centralized...

AXIGEN Mail Server 7.0, Now with Push Email, PIM Syncronization and more

AXIGEN (http://www.axigen.com), the professional messaging solution vendor, released today a new commercial version of its messaging solution, Axigen Mail Server 7.0.  Freshly added features in version 7.0 include built-in support for...

Microsoft and Gecad Technologies Announce Exchange ActiveSync Patent License Agreement

REDMOND, Wash., and BUCHAREST, Romania — March 25, 2009 — Microsoft Corp. and Gecad Technologies today announced a patent licensing agreement to implement Microsoft Exchange ActiveSync on Gecad’s AXIGEN Mail Server offering. The...

Boost Business Productivity with AXIGEN

AXIGEN launches new version of its messaging solution with extended Groupware and Sharing Capabilities AXIGEN (http://www.axigen.com), the professional messaging solution vendor, today announces the commercial release of a new version of its messaging...

GateSoft to distribute the AXIGEN messaging solutions in Italy

Volta Mantovana, Italy and Bucharest, Romania, April 22, 2009. AXIGEN (http://www.axigen.com), the professional messaging solution vendor, announces today the signing of a new distribution partnership for its mail server product range with Italian...

AXIGEN Strengthens Its Presence in Russia

Bucharest, Romania and Moscow, Russia, May 14, 2009 – AXIGEN (http://www.axigen.com), the professional messaging solution vendor, and Mosqit LLC (http://www.mosqit.ru), Russian provider of integrated IT solutions, announced today the signing of a...

AXIGEN Mobile Email, Now on BlackBerry

Bucharest, Romania and San Jose, USA - May 28, 2009 - AXIGEN (http://www.axigen.com), the professional messaging solution vendor, and Notify Technology Corporation (OTC BB: NTFY; http://www.notifycorp.com), today announced the signing of a...

AXIGEN Mail Server, Now Available in Sri Lanka

Bucharest, Romania and Colombo, Sri Lanka - June 09, 2009 – AXIGEN (http://www.axigen.com), the professional messaging solution vendor, today announced the signing of its first business agreement with a Sri Lanka-based company, Greenwich Lanka...

Enterprise Class Messaging and Archiving Powered by Arcmail and AXIGEN

Shreveport, USA and Bucharest, Romania, June 24, 2009. Arcmail Technology, Inc. (http://www.arcmail.com), a leading provider of email archiving and management products, and AXIGEN (http://www.axigen.com), the professional messaging solution vendor,...

iDesign Brings the AXIGEN Mail Server to Hong Kong

Kowloon, Hong Kong and Bucharest, Romania, July 9th, 2009. AXIGEN (http://www.axigen.com), the professional messaging solution vendor, announces today the launch of its messaging solution range in Hong Kong through its first distribution partnership in...

The Cool Web Experience of Your Former Desktop Client - New Axigen WebMail, Ajax Powered

The AXIGEN Mail Server 7.2 Beta is the first step towards the ambitious goal of taking Web communication interfaces to the next levelBucharest, Romania, July 20th, 2009. AXIGEN, (http://www.axigen.com), the professional messaging solution vendor,...

AXIGEN Releases Version 7.2 with New, Ajax Powered WebMail

Bucharest, Romania, September 24th, 2009. AXIGEN, (http://www.axigen.com), the professional messaging solution vendor, announces today the official release of a new mail server version, Axigen 7.2. The new version features a new WebMail technology...

AXIGEN Further Reinforces Its Presence in Sri Lanka

Bucharest, Romania and Colombo, Sri Lanka, October 19, 2009 – AXIGEN, the professional messaging solution vendor (http://www.axigen.com), announced today the signing of a business partnership with Minlo Technologies Ltd (http://www.minlotec.com),...

AXIGEN Receives ISO Certification for Excellence in Quality Management

Bucharest, Romania, October 29, 2009. AXIGEN (http://www.axigen.com), the professional messaging solution vendor, announces today that it has recently received the ISO 9001: 2008 certification that confirms the company’s high standards of quality...

Xatacom Inc. Teams Up with AXIGEN to Become its Newest Distribution Partner in the USA

Bucharest, Romania, November 12, 2009. AXIGEN (http://www.axigen.com), the professional messaging solution vendor, announces today that it has partnered with Texas-based IT professional services provider Xatacom Inc (http://www.xatacom.com) to supply...

AXIGEN Releases Version 7.3 with Increased Security and Manageability

Bucharest, Romania, December 3, 2009 – AXIGEN (http://www.axigen.com), the professional messaging solution vendor, announced today the commercial release of AXIGEN Mail Server 7.3, designed to be a perfect fit for the Service Provider segment...
Events posted by oana.raileanu

Inbox/Outbox 2009

Inbox/Outbox is a comprehensive forum for Email Management and Email Marketing, presenting some of the world’s leading speakers via an innovative educational format - to deliver high-value content for senior IT & marketing executives.The...

CeBIT, March 2009

CeBIT - the biggest trade show for the ICT sector worldwide - is universally regarded as the no. 1 marketplace for digital business. In March 2009, CeBIT will once again be opening its gates in Hannover, Germany. The world's largest and most renowned...

Software Business 2009 Conference

Software Business 2009 will focus on current strategic business, financial and technology issues and growth opportunities facing executives and managers of small to mid-level software companies.This two day conference serves owners, chief executives,...

Florida Linux Show 2009

The Florida Linux Show is a must for all Florida companies whose technology and success, revolve around the Internet (this is everyone). With the power of the Internet reaching into global, national, and local markets it is important to remain vigilant...

HostingCon 2009

HostingCon 2009, the premier conference and trade show for the hosted services industry is the largest gathering of hosted services professionals in the world. The best and brightest from the industry will be in attendance to learn about the latest...
Already a member?
Blacklist monitoring alerts
sign up Signup for our real-time monitoring service and receive email notifications each time one of your IPs gets blacklisted.
Free Signup
Mail Server Operating System Poll
.01

What OS do you use for your email server?
Linux
Windows
Other
disabled next
.02

How many mailboxes do you currently manage?
1-50
51-300
300+
previous next
.03

Would you like to comment upon the choosing of this particular OS?

previous
 
DNS Tools
Get IP status, owner and location, obtain its corresponding hostname or check specific ports.
Ping Statistics
Reverse DNS Lookup
Whois Info (IP owner)
GeoIP Information
Check Port
Open Relay Test
Test if your mail server is an open relay for spammers.
Blacklist Checker
Check if your IP is listed in DNS based email blacklists (DNSBL)